technology overview for w3c wot group...alarms are traditionally connected through gsm to central...

39
Technology Overview for W3C WoT Group Juan Carlos ZUNIGA Senior Standardization Expert – Sigfox 10.07.17

Upload: others

Post on 23-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

Technology Overview for W3C WoT Group

Juan Carlos ZUNIGA

Senior Standardization Expert – Sigfox

10.07.17

Page 2: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

1 INTRODUCTION

2 USE CASES AND DEPLOYMENTS

3 TECHNOLOGY

4 KEY FEATURES

5 IoT: CONNECTING THE “I” WITH THE “T”

2

Page 3: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

INTRODUCTION

▪ Sigfox, Low Power Wide Area Networks (LPWAN) and Massive IoT

1

3

Page 4: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

A dream of disruption to make things come alive

4

“Time flies! It’s already been more than five years that we

have been chasing our dream to change the world with a

crazy idea to connect the physical world to the Internet,

consuming as little energy as possible and as simply as

possible.

Today we are making it a reality, with hundreds of millions of

messages already transmitted and received via the Sigfox

Network, which continues to deploy around the globe.

This is what we like to call the “Power of Low,” which fully

embodies the meaning of the Internet of Things – a huge

revolution without precedent. We’re excited about where all

this is headed, and we hope you’re excited about it too!”

Ludovic Le Moan

CEO Sigfox

Christophe Fourtet

CSO Sigfox

Page 5: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

KEY GOALS FOR MASSIVE IoT

Ultra Low Cost (Devices and Network)

Ultra Low Current Drain

Ultra High Capacity – Scalability

Global Simplicity

5

HIGH

CAPACITY

GLOBAL

SIMPLICITY

COST

EFFECTIVE

ENERGY EFFICIENT

Page 6: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

SIGFOX IS A LOW POWER WIDE AREA NETWORKcomplementing existing networks to address the bulk of connected objects

6

802.11ah

PAN WANLAN

2G3G4G LTE-M 5G NB-IoT

LPWAN requirements

LPWAN definition

▪ High density of objects▪ Reduced H/W cost▪ Reduced connectivity cost▪ Low data rates▪ Constrained latency

SCALE

ENERGY & COST EFFICIENCY PUBLIC

CONNECTIVITYPERSONAL & PRIVATE NETWORKS

Page 7: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

WHERE WE ARE IN THE IoT CHAINA network to transport data from connected objects to the customer IT systems

7

Ecosystempartners

• Royalty free license

• Certifies integration

• Certifies device • Builds and operates

the network with

regional SNO partners

• Provides Internet

connectivity

• Provides API

• Certifies platform

compatibility

• Provides API

• Certifies application

compatibility

• Data storage

• Big Data analytics

• Vertical specific

solutions and

intelligence

• Integrate Sigfox

connectivity module

into product

• Sell and support

cheap and

compatible H/W for

Sigfox network

Connectivityprovider

Platformproviders

Devicemakers

Chip & modulevendors

Vertical Application

Sigfox

Page 8: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

USE CASES AND DEPLOYMENTS

3▪ Customer stories▪ Country deployments▪ Sigfox Foundation

Page 9: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

Assisted Living Box

9

The city council of Loiret in France, which supports financially medical

cares for seniors, was regularly overcharged by care service providers.

With the ageing population, there is a need for solutions to help seniors

staying at home longer without their relatives worrying too much.

▪ The ROI was reached within

the first 6 months thanks to

the savings of 3 million € per

year, which represent 10%

of their budget. The total

cost of the project was 1.5

million €.

▪ The adoption rate was 97%

among the seniors.

▪ The social isolation broke

down and services quality

went up.

The Lysbox helps monitoring service

providers and automate the billing based

on the actual time spent with the seniors.

It also sends alerts to neighbors or

families in case of a heat wave or cold

spell detected through the temperature

sensor of the device.

Finally, seniors can also call for help

thanks to the emergency button on the

device.

Challenge

BenefitsSolution

MANAGE PEOPLE

REMOTLY

Page 10: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

SECURE BETTERHome Alarm System

10

Alarms are traditionally connected through GSM to central system and

burglar intrusion can be facilitated by GSM jammers. There is a need for

effective backup connectivity to ensure more robust alarm transmissions.

▪ Robustness of solution is a

commercial differentiator

▪ Continuity of service

▪ Soft deployment via over the

air update - no HW swap. No

user impact

▪ Network available to handle

millions of devices

Sigfox has upgraded Securitas

Direct’s alarm systems to provide a

back-up connectivity in case

jamming is detected.

The upgrade was possible over the

air as a Sub-GHz chip was already

inside.

Challenge

BenefitsSolution

Alternative partners for this application

Page 11: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

SECURE BETTERSmoke Detector

11

Alarms are traditionally connected through GSM to central system and

burglar intrusion can be facilitated by GSM jammers. There is a need for

effective backup connectivity to ensure more robust alarm transmissions.

▪ A Unique Selling Proposition:

▪ Easy to install

▪ Secure data transmission

▪ Proof of function

▪ 5+ year battery life

▪ TAM: 12 million policy holders

Connected smoke detectors to

increase safety

Regular status (heartbeat) monitors

check sensors are functioning

correctly

Real time alerts through phone calls,

SMS, and emails

Distribution through retail and

insurance companies

Challenge

BenefitsSolution

Alternative partners for this application

Page 12: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

OPTIMIZE YOUR

RESSOURCES

Precision Agriculture

12

Irrigation & usage of fertilizers are based on the intuition of the farmer and

represent a big part of its operating costs.

▪ Save water resources

▪ Decrease operating cost by

using no more water and

fertilizers than what is

actually needed

▪ Micromanagement of the

parcel

▪ Improve production

quantity and quality

GreenCityZen offers the HummBox, a

continuous measurement solution for

the monitoring of environmental data.

Hummbox is an energy and

communication means stand-alone

solutions, very simple to deploy and

interoperable. The HummBox brings

immediate benefits such as reduced

costs of field trips, improved process

performance and help to enrich service

offerings ect leaks and water waste.

Challenge

BenefitsSolution

Page 13: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

Thanks to our IoT solutions, we enable to unlock 5 main business benefits…

Control quality of delivery (SLA, humidity, temperature, shock)

Identify responsibility of assets and localization off site

Ensure recovery of lost assets

1

Increase security for remote facilities, assets & people

Complement existing connectivity with an anti-jamming solution2

Ensure uptime with predictive & reactive maintenance

Optimize your maintenance routes

Automate replenishment

3

Control your providers, patients, employees remotely 4

Get more out of your assets, energy & people5

TRACKING

MOVING ASSET

REINFORCING SECURITY

IMPROVING UPTIME

MANAGING PEOPLE

REMOTELY

OPTIMIZING

RESOURCES

13

Page 14: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

14

Sigfox network relies on Sigfox Operators that provide the network coverage in countries

IOT Malta Ltd.

IOT Net Mexico

Page 15: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

15

Sigfox and Operators offer to customers an ecosystem on which all objects can be connected

1,000

10,000

1,000,000,000

1

100

Network

Channel Partners

Customers

Objects

Page 16: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

16

Sigfox Foundation

Page 17: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

TECHNOLOGY

▪ Ultra narrow band▪ Random access▪ Cooperative reception▪ Small messages▪ Bi-directional▪ Cloud-based Core Network

2

17

Page 18: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

18

ULTRA NARROW BAND RANDOM ACCESS COOPERATIVE RECEPTION

SIGFOX CLOUDCORE

SMALL MESSAGES PIGGYBACK BI-DIR

Page 19: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

ULTRA NARROW BAND (EU)

100Hz wide in a 200 kHz band

DBPSK

High spectrum efficiency 1bit/s = 1Hz of bandwidth

Page 20: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

RANDOM ACCESS

Unsynchronized transmission

Random frequency

SIGFOX Base stations permanently listen to the spectrum

3 replicas of the same frame @ 3 frequencies

Page 21: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

21

COOPERATIVE RECEPTION

Message received by 3 Base Stations in average

Spatial diversity decreases collision probability

MIMO like Approach

Page 22: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

22

1 % duty cycle for ObjectsUp to 6 messages/hour

UPLINK12-byte payload

- Sensor data- Event status- GPS fix- Application data

DOWNLINK8-byte payload

- Action / actuator trigger- Device management- Application parameter setting

10 % duty cycle for Base Stations4 guaranteed downlink msg/day

SIGFOX CLOUD

SMALL MESSAGESto answer the cost & autonomy constraints of remote objects

6 bytes: GPS coordinates

2 bytes: temperature reporting

1 byte: speed reporting

1 byte: object state reporting

0 byte: heartbeat (object keepalive)

Payload size examples

Page 23: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

23

DEVICE DRIVEN BI-DIRECTIONAL

Downlink requested by the device to the network

Delay of 20 seconds – 25 seconds downlink window

Downlink frequency derived from uplink frequency

Page 24: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

24

SIGFOX CLOUD-BASED CORE

Centralized Authentication & Message Forwarding

Flat RAN Architecture

Page 25: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

KEY FEATURES▪ High energy efficiency▪ Long range▪ Simple connectivity▪ Secure

3

25

Page 26: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

26

HIGH ENERGY EFFICIENCYto offer maximum autonomy to remote objects

Designed to maximize energy efficiency

No pairing / network attachment required

15 to 45 mA during a few seconds (25mW; 14dB) depending on the chip and the size of the payload

Idle consumption: negligible

Idle state

Communication state

6 nA

30 mA

Current

Time

~6 sec

99.x% of the time

Page 27: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

27

VERY LONG RANGEto quickly offer great coverage at minimum cost

Constant output power and low data rate provide comfortable link budget and long range

Good coverage due to the use of sub-1GHz bands

Modulation Data-rate (bps)

Tx Power Compound TXAntenna Gain

Compound RX Antenna Gain

RX sensitivity Link Budget

Uplink (ETSI) DBPSK 100 +14 dBm 0dB +6dB -142dBm +162dB

Downlink(ETSI)

GFSK 600 +27 dBm +6dB 0dB -130dBm +163dB

Uplink (FCC) DBPSK 600 +22 dBm 0dB 0dB -134 dBm +156dB

Downlink (FCC)

GFSK 600 +30 dBm 0dB 0dB -129 dBm +159dB

Page 28: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

28

Registration Installation Data

PROVISIONING PLUG AND PLAY CLOUD

The protocol works in a mono-directional way,

requiring no synchronization with the network

All user data is available tough a unique cloud with

standard APIs

Maintenance

LIMITED MAINTENANCE

Thanks to the long autonomy of the objects, and the

predictability of the battery life, battery

replacements can be minimized and easily

maintained

Register devices into SIGFOX cloud.

Device subscription starts when the first message is

sent

OUT OF THE BOX CONNECTIVITY

Page 29: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

29

THE RIGHT LEVEL OF SECURITYto protect what matters, where it matters

SIGFOX SECURITY IS A PROCESS – SECURITY BY DEFAULT

AUTHENTICATIONINTEGRITYITYPRIVACY

STRONG SECURITY MECHANISMS AT THE HEART OF THE COMMUNICATION SOLUTION

Page 30: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

CONNECTING THE ‘I’ WITH THE ‘T’▪ Standards and interoperability at application level▪ Privacy and security-by-design▪ Collaborative security▪ Multi-stakeholder policy approach

4

30

Page 31: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

KEY ENABLERS TO LINK THE “T” AND THE “I”

Standards-based application-level interoperability

Collaborative approach to security

Multi-stakeholder policy development

Privacy-by-design practices✓

31

Page 32: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

INTEROPERABILITY AT APPLICATION LEVEL

IETF

• Developing Internet protocols, from Layer 3 (IPv6) up to Application Layer (HTTP, CoAP)

• Full set of protocols for the IoT, including data representations, interaction models, security, etc.

LPWAN WG

• Defining interworking functions such as:

• common network layer,

• management features,

• security features, and

• application profiles

32

BnB Demonstration at IETF 98 Chicago and Hackathon at IETF 99 Prague

• IPv6/CoAP over LPWAN demonstration

• https://www.sigfox.com/en/news/sigfox-pioneers-internet-things-interoperability-further-accelerate-mass-market-adoption

• Interoperability of SCHC implementations over Sigfox and LoRa

• https://www.ietf.org/registration/MeetingWiki/wiki/99hackathon

Page 33: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

INTEROPERABILITY AT APPLICATION LEVEL

Page 34: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

PRIVACY

Narrow: focused on individuals

Broad: any information related to an individual that can identify him/her, directly or indirectly, may be relevant

Note that standards are limited to what can be addressed in protocol design - vs. deployment and operation

34

Identification

Correlation

Secondary use

Disclosure

Exclusion

Surveillance

Stored data compromise

Intrusion

Misattribution

Scope

Threats

Page 35: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

PIIs IN THE INTERNET OF “THINGS”

35

Personally Identifiable Information (PII)

Page 36: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

PRIVACY BY DESIGN (PbD)

Need to embrace PbD principles:

• Proactive not reactive

• Privacy as the default setting

• Privacy embedded into design

• Full functionality – positive-sum, not zero-sum

• End-to-end security – full lifecycle protection

• Visibility and transparency – keep it open

• Respect for user privacy – keep it user-centric

36REF: https://www.ipc.on.ca/privacy/protecting-personal-information/privacy-by-design/

Page 37: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

SIGFOX’S APPROACH TO SECURITY AND PRIVACY

Certification programs

• Applied to modules, devices and cloud platforms

Resiliency to botnets and tempered-with devices

• Blocking and blacklisting capabilities at the cloud

Privacy-friendly practices

• Anonymization of data collected and retained

Strong security features

• Authentication, data integrity and ity

• Secure APIs

• Different levels of security available depending on the criticality and type of application

37

Page 38: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

CONSIDERATIONS FOR IoT DEVELOPMENTfostering potential economic and societal benefits, while addressing associated challenges

Promotion of Internet and data-infrastructure growth

• Refrain from mandating technical approaches to IoT – Instead encourage open, voluntary IoT standards to support innovation

• Promote efficient and very low cost use of wireless spectrum to allow for economy of scale, e.g. licensed-exempt, technology neutral, and harmonized over several regions

Multi-stakeholder approach to policy discussions

• Including policy makers, standards bodies, service providers, network operators, infrastructure manufacturers, device manufacturers, and end users

Collaborative approach to security

• Empower players to address security issues close to where they occur, instead of centralizing responsibility amongst a few

• Promote inclusiveness/transparency, collective responsibility, effective decision-making /implementation, collaboration

Promote responsible design practices

• Encourage security-by-design and privacy-by-design practices to maintain user’s trust in technology38

Page 39: Technology Overview for W3C WoT Group...Alarms are traditionally connected through GSM to central system and burglar intrusion can be facilitated by GSM jammers. There is a need for

Thank You

Juan-Carlos Zúñiga

[email protected]

39